You have an Azure subscription that contains 50 virtual machines that run Windows Server. The virtual machines are onboarded to Microsoft Defender for Cloud. You need to identify the virtual machines that are missing updates and have Windows firewall disabled. What should you configure? auto provisioning Odata collection Defender plans workflow automation

To identify the virtual machines that are missing updates and have Windows firewall disabled in your Azure subscription with Microsoft Defender for Cloud, you should configure the following:

  1. In Defender for Cloud, ensure that the 'Microsoft Defender for Servers' plan is enabled for your subscription [5] [8].
  2. Configure Defender for Cloud to collect event data from the virtual machines, which will allow it to monitor and detect missing updates and firewall status [2].
  3. Use Defender for Cloud's 'Secure Score' feature to identify virtual machines that are missing updates. The Secure Score provides a measurement of an organization's security posture, with recommendations for improvement [8].
  4. For the firewall status, Defender for Cloud provides security alerts if the Windows firewall is disabled. You can check these alerts in the 'Security alerts' section of Defender for Cloud [8].

You should not configure 'auto provisioning', 'Odata collection', or 'workflow automation' as they are not relevant to your needs [1] [3] [4] [6].

[1] Exam AZ-104 topic 5 question 10 discussion. [2] Question #: 42. Topic #: 2. [All SC-200 Questions] [3] Each data disk can be up to 32,767 GiB. The number of data disks you can use depends on the size of the virtual machine. [4] You have an Azure subscription that contains an ASP.NET application. The application is hosted on four Azure virtual machines that run Windows Server 2022. [5] Search for and select Microsoft Defender for Cloud. In the Defender for Cloud menu, select Environment settings. [6] Request a pricing quote. Get free cloud services and a $200 credit to explore Azure for 30 days. [8] Defender for Cloud is an Azure service that continuously monitors the customer's Azure, multicloud, and on-premises environment and applies analytics to automatically detect a wide range of potentially malicious activity.

References

Any other questions?